General

  • Target

    e191875312138b468454bcf4775484c078068eb9b79f43b0d2b9f35e615a60b0

  • Size

    1.5MB

  • Sample

    250328-ma2ezsvsgx

  • MD5

    79dfccfb01f343bf29ac1b34d7ffca6a

  • SHA1

    a80c5dfc5118f554fcb251b9d95d7a2216dab569

  • SHA256

    e191875312138b468454bcf4775484c078068eb9b79f43b0d2b9f35e615a60b0

  • SHA512

    a9119954f3479c381cbca567ce17458fd4bb652afa92fd2163cc19737faf88fdef8be128705082172252dfc08f27e16f1a1ad5a2ffec0a66daf4c7e8d887b3ef

  • SSDEEP

    24576:uYVLN+uGOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:RTT3HPkVOBTK

Malware Config

Targets

    • Target

      e191875312138b468454bcf4775484c078068eb9b79f43b0d2b9f35e615a60b0

    • Size

      1.5MB

    • MD5

      79dfccfb01f343bf29ac1b34d7ffca6a

    • SHA1

      a80c5dfc5118f554fcb251b9d95d7a2216dab569

    • SHA256

      e191875312138b468454bcf4775484c078068eb9b79f43b0d2b9f35e615a60b0

    • SHA512

      a9119954f3479c381cbca567ce17458fd4bb652afa92fd2163cc19737faf88fdef8be128705082172252dfc08f27e16f1a1ad5a2ffec0a66daf4c7e8d887b3ef

    • SSDEEP

      24576:uYVLN+uGOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:RTT3HPkVOBTK

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks